Cryptographic attacks

Rootkit

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software. The term rootkit is a compound of "root" (the traditional name of the privileged account on Unix-like operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware. Rootkit installation can be automated, or an attacker can install it after having obtained root or administrator access. Obtaining this access is a result of direct attack on a system, i.e. exploiting a vulnerability (such as privilege escalation) or a password (obtained by cracking or social engineering tactics like "phishing"). Once installed, it becomes possible to hide the intrusion as well as to maintain privileged access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it. Rootkit detection is difficult because a rootkit may be able to subvert the software that is intended to find it. Detection methods include using an alternative and trusted operating system, behavioral-based methods, signature scanning, difference scanning, and memory dump analysis. Removal can be complicated or practically impossible, especially in cases where the rootkit resides in the kernel; reinstallation of the operating system may be the only available solution to the problem. When dealing with firmware rootkits, removal may require hardware replacement, or specialized equipment. (Wikipedia).

Rootkit
Video thumbnail

Sound Effect I

This is a video response to RootBerry Sound Effect Contest. I've been able to do this sound since I was a kid and I've never met anybody else who could do it... Anyway, forgive me for that. ;~)

From playlist Other...

Video thumbnail

Sound Effect III

This is a video response to RootBerry Sound Effect Contest. I saw a man who could play music like that. I'm not that good, though. Anyway, forgive me for that. ;~)

From playlist Other...

Video thumbnail

Scrum in 16 minutes

What is Agile Scrum? Learn in 16 minutes in this introduction to scrum video. Scrum is a framework for managing work with an emphasis on software development. It's a subset of Agile. Video by Agile Coach Chris Gagné: https://chrisgagne.com/ - Learn to code for free and get a developer j

From playlist Tutorials

Video thumbnail

WebAssembly: The What, Why and How

WebAssembly is a portable, size, and load-time efficient binary format for the web. It is an emerging standard being developed in the WebAssembly community group, and supported by multiple browser vendors. This talk details what WebAssembly is, the problems it is trying to solve, exciting

From playlist Talks

Video thumbnail

The BuShou of HanZi :田

A brief description of the BuShou of 田.

From playlist The BuShou of HanZi

Video thumbnail

the C language (part 2 of 5)

Introduction to the C programming language. Part of a larger series teaching programming. See http://codeschool.org

From playlist The C language

Video thumbnail

How to Build a KeyLogger in C++ | Introduction | #C | #programming

Don’t forget to subscribe! This project series is about creating a Keylogger in C++. A KeyLogger is a program that can capture every key or click that is pressed on the computer asynchronously. In order to get useful information, we will learn how to erase the cache, build the keylogger

From playlist Build A KeyLogger In C++

Video thumbnail

the Internet (part 2)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

the C language (part 5 of 5)

Introduction to the C programming language. Part of a larger series teaching programming. See http://codeschool.org

From playlist The C language

Video thumbnail

How To Detect Rootkits On Kali Linux - chkrootkit & rkhunter

Hey guys! HackerSploit here back again with another video, in this video, we will be looking at how to check for rootkits on Kali Linux or any other Linux distribution. A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

DEFCON 13: Surgical Recovery from Kernel-Level Rootkit Installations

Speaker: Julian Grizzard Conventional wisdom states that once a system has been compromised, it can no longer be trusted and the only solution is to wipe the system clean and reinstall. This talk goes against the grain of conventional wisdom and asks are there more efficient ways to repa

From playlist DEFCON 13

Video thumbnail

Linux Defense Evasion - Apache2 Rootkit

In this video, I demonstrate the process of establishing persistence and evading defenses on Linux through the use of an Apache2 rootkit. //LINKS Apache2 Rootkit: https://github.com/ChristianPapathanasiou/apache-rootkit //PLATFORMS BLOG ►► https://bit.ly/3qjvSjK FORUM ►► https://bit.ly

From playlist Red Team Fundamentals

Video thumbnail

DEFCON 18: This is Not the Droid You're Looking For 2/3

Speakers: Nicholas J. Percoco, Christian Papathanasiou Android is a software stack for mobile devices that includes an operating system, middleware and key applications and uses a modified version of the Linux kernel. 60,000 cell phones with Android are shipping every day. Android platf

From playlist DEFCON 18-2

Video thumbnail

Source Boston 2010: Managed Code Rootkits: Hooking into Runtime Environments 5/6

Clip 5/6 Speaker: Erez Metula This presentation introduces an underestimated threat of application level rootkit attacks on managed code environments, enabling an attacker to change the language runtime implementation, and to hide malicious code inside its core. We'll be covering generic

From playlist SOURCE Boston 2010

Video thumbnail

CERIAS Security: An Alternate Memory Architecture for Code Injection Prevention 3/4

Clip 3/4 Speaker: Ryan Riley · Purdue University ode injection attacks, in their various forms, have been in existence and been an area of consistent research for a number of years. A code injection attack is a method whereby an attacker inserts malicious code into a running computing sy

From playlist The CERIAS Security Seminars 2009

Video thumbnail

Source Boston 2010: Managed Code Rootkits: Hooking into Runtime Environments 1/6

Clip 1/6 Speaker: Erez Metula This presentation introduces an underestimated threat of application level rootkit attacks on managed code environments, enabling an attacker to change the language runtime implementation, and to hide malicious code inside its core. We'll be covering generic

From playlist SOURCE Boston 2010

Video thumbnail

DEFCON 14: Oracle Rootkits 2.0

Speaker: Alexander Kornbrust, Founder & CEO, Red-Database-Security GmbH Abstract: In 2006 thousands of people will create applications based on the free Oracle 10g Express Edition. Even if this version of Oracle (based on Oracle 10g Rel. 2) is the most secure database from Oracle out of t

From playlist DEFCON 14

Video thumbnail

DeepSec 2009: The Kingdom of the Blind: OS X Incident Response

Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speaker: Morgan Marquis-Boire Morgan Marquis-Boire explains what he learnt from OS X incident response, security issues and malware running on OS X (yes, there is malware for OS

From playlist DeepSec 2009

Video thumbnail

HAR 2009: Runtime Kernel Patching on Mac OS X 1/5

Clip 1 Speaker: Bosse Eriksson This talk will focus on rootkit development on Mac OS X. It will cover the basics as well as a couple of (somewhat) new tricks. We will also talk about rootkit detection on Mac OS X. For more information go to: https://har2009.org/program/events/169.e

From playlist Hacking at Random (HAR) 2009

Video thumbnail

DesmosLIVE: An Exploration of Desmos + Mathalicious

Kate Nowak of Mathalicious explores a few Mathalicious lessons with Desmos

From playlist Desmos LIVE

Related pages

Code signing | Type I and type II errors | PrivateCore | Digital signature | Man-in-the-middle attack | Password cracking | Stuxnet | Cryptographic hash function | Computer security | Principle of least privilege | Botnet | Checksum | Keystroke logging | Backdoor (computing)